CVE-2020-3242 is a vulnerability in Cisco Ucs Director
Published on June 18, 2020
Cisco UCS Director Information Disclosure Vulnerability
A vulnerability in the REST API of Cisco UCS Director could allow an authenticated, remote attacker with administrative privileges to obtain confidential information from an affected device. The vulnerability exists because confidential information is returned as part of an API response. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to obtain the API key of another user, which would allow the attacker to impersonate the account of that user on the affected device. To exploit this vulnerability, the attacker must have administrative privileges on the device.
Weakness Type
What is an Information Disclosure Vulnerability?
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CVE-2020-3242 has been classified to as an Information Disclosure vulnerability or weakness.
Products Associated with CVE-2020-3242
Want to know whenever a new CVE is published for Cisco Ucs Director? stack.watch will email you.
Affected Versions
Cisco Unified Computing System (Management Software) Version n/a is affected by CVE-2020-3242Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.